The Second International Workshop on Traffic Monitoring and Analysis (TMA 2010) was an initiative of the COST Action IC0703 "Data Traffic Monitoring and Analysis: Theory, Techniques, Tools and Applications for the Future Networks" (http:// www.tma-portal.eu/cost-tma-action). The COST program is an intergovernmental framework for European cooperation in science and technology, promoting the coordination of nationally funded research on a European level. Each COST Action aims at reducing the fragmentation in - search and opening the European research area to cooperation worldwide. Traffic monitoring and analysis (TMA) is nowadays an important research topic within the field of computer networks. It involves many research groups worldwide that are collectively advancing our understanding of the Internet. The importance of TMA research is motivated by the fact that modern packet n- works are highly complex and ever-evolving objects. Understanding, developing and managing such environments is difficult and expensive in practice. Traffic monitoring is a key methodology for understanding telecommunication technology and improving its operation, and the recent advances in this field suggest that evolved TMA-based techniques can play a key role in the operation of real networks.
Author(s): Sebastian Castro, Min Zhang, Wolfgang John, Duane Wessels, Kimberly Claffy (auth.), Fabio Ricciato, Marco Mellia, Ernst Biersack (eds.)
Series: Lecture Notes in Computer Science 6003 : Computer Communication Networks and Telecommunications
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 199
Tags: Computer Communication Networks; System Performance and Evaluation; Information Systems Applications (incl.Internet); Information Storage and Retrieval; Management of Computing and Information Systems
Front Matter....Pages -
Understanding and Preparing for DNS Evolution....Pages 1-16
Characterizing Traffic Flows Originating from Large-Scale Video Sharing Services....Pages 17-31
Mixing Biases: Structural Changes in the AS Topology Evolution....Pages 32-45
EmPath: Tool to Emulate Packet Transfer Characteristics in IP Network....Pages 46-58
A Database of Anomalous Traffic for Assessing Profile Based IDS....Pages 59-72
Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases....Pages 73-86
DeSRTO: An Effective Algorithm for SRTO Detection in TCP Connections....Pages 87-100
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory....Pages 101-114
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers....Pages 115-126
TCP Traffic Classification Using Markov Models....Pages 127-140
K-Dimensional Trees for Continuous Traffic Classification....Pages 141-154
Validation and Improvement of the Lossy Difference Aggregator to Measure Packet Delays....Pages 155-170
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison....Pages 171-182
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network....Pages 183-197
Back Matter....Pages -